dibujitos

dibujitos

3rd Grade

31 Qs

quiz-placeholder

Similar activities

imaginary situations

imaginary situations

1st Grade - University

28 Qs

Safety signs

Safety signs

1st - 5th Grade

36 Qs

architecture cultural

architecture cultural

3rd Grade

30 Qs

unit 7

unit 7

1st - 5th Grade

32 Qs

CKLA Unit 3 Human Body Review

CKLA Unit 3 Human Body Review

3rd Grade

26 Qs

AAR3234 History & Theory f SEA, Japan, China & India

AAR3234 History & Theory f SEA, Japan, China & India

1st - 5th Grade

27 Qs

Children's international day

Children's international day

KG - 3rd Grade

27 Qs

Sydney Trains!

Sydney Trains!

2nd Grade - Professional Development

28 Qs

dibujitos

dibujitos

Assessment

Quiz

Architecture

3rd Grade

Easy

Created by

heber molero

Used 21+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

the root and the_internet vdoms are configured in nat mode the dmz and local vdoms are configured in tranparent mode. the root vdom is the management vdom the to_internet vdom allows lan users to access the internet.the to_internet vdom is the only vdom with internet access and is directly connected to ISP modem. which statement is true?

inter-vdom links are not requiered between the root and to_internet vdoms and to_internet vdoms because the root vdoms is used only as a management vdom

inter-vdom links are required to allow traffic between the local and dmz vdoms

inter-vdom links are required to allow traffic between the local and root vdoms

a static route is required on the to_internet vdom to allow lan users to access the internet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

review the intrusion prevention system(ips) profile signature settings. which statement is correct in adding the ftp.login.failed signature to the ips sensor profile?3

traffic matching the signature will be allowed and logged

traffic matching the signature will be silently dropped and logged

the signature setting uses a custom rating threshold,

the signature setting includes a group of other signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

refer to the exhibit to view the firewall policy. which statement is correct it if well-known viruses are not being blocked?5

the firewall policy does not apply deep content inspection

the action on the firewall policy must be set to deny

web filter should be enable on the firewall policy to complement the antivirus profile

the firewall policy must be configured in proxy-based inspection mode

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

the exhibit contains a network diagram, central snat policy, and IP pool configuration. the WAN(port1) interfaces has the ip address 10.200.1.1/24. the lan(port3) interfaces has the IP address 10.0.1.254/24. a firewall policy is configured to allow all destination from................7

10.200.1.99

10.200.1.49

10.200.1.149

10.200.1.1

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

based on the raw log, which two statements are correct? choose two.8

traffic is blocked because action is set to DENY in the firewall policy

log severity is set to error on fortigate

traffic belongs to the root VDOM

this is a security log

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

based on the administrator profile settings what permissions must the administrator set to run the diagnose firewall auth list CLI command on foritgate?

read/write permission for log & report

read/write permission for firewall

custom premission for network

CLI diagnostics commands permission

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

the exhibit contains a network diagram, firewall policies, and a firewall address object configuration. an administrator created a deny policy with default settings to deny webserver access for remote user2 remote-user2 is still able to access webserver. which two changes can the administrator make to deny webserver access for remote-user2?choose two.10

disable match-vip in the Deny policy

enable match-vip in the deny policy

set the destination address as web server in the deny policy

set the destination address as deny. ip in the allow-access policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?